You are on page 1of 7

Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR2082

Decentralized Wallet Application using Blockchain


Khetesh Choudhary1; Afiya Dhanse2; Mandavi Dubey3; Yash Kushwaha4; Prof. Anand Ingle5
1,2,3,4
B. E Graduate(IV year), Department of Computer Engineering, MGMCET, Maharashtra, India

Abstract:- Decentralized applications (DApps) are the wallet's functionalityand security. User experience and
gaining significant traction due to the widespread feedback will be assessed to drive iterative improvements.
adoption and development of blockchain technology. Furthermore, the project will include a comparative
These applications receive substantial funding through evaluation of the decentralized wallet's performance and
crowdfunding, reflecting the growing interest in their security in relation to traditional centralized alternatives.
potential. Despite this, there remains ambiguity Ultimately, the project aims to provide recommendations
surrounding their definitions, architectures, and for the future development and adoption of decentralized
classifications. This survey seeks to address these gaps wallet applications, helping to bridge the gap between
by offering a comprehensive exploration of DApps for blockchain technology and mainstream financial services.
further investigation.
II. EXISTING SYSTEM
Decentralized Applications, are software programs
that typically include front-end interfaces, smart First and foremost, user-friendliness remains a
contracts for automation, and decentralized protocols challenge, as the intricacies of managing private keys and
for data storage and communication. Analyzing popular addresses can be intimidating, especially for non-technical
DApps reveals their varied functionalities, advantages, users. Additionally, the lack of account recovery options
and challenges, showcasing the potential for poses a significant risk; if users lose their private keys or
decentralized technologies to reshape industries. Lastly, wallet access, they may face the irreversible loss of assets.
the survey outlines recent research problems Scalability issues on certain blockchain networks can affect
concerning DApps, focusing on economics, security, and transaction speed and cost, potentially hampering the
performance. It identifies promising avenues for future efficiency of decentralized wallets for everyday use. While
research in this domain. decentralized wallets offer increased security through user-
controlled private keys, this also places the responsibility of
Keywords:- Blockchain, AWS, Android Studio, Flutter, safeguarding keys entirely on the users, leaving their assets
React-Native. vulnerable if keys are lost or stolen.

I. INTRODUCTION Furthermore, the level of customer support for


decentralized wallet applications is generally limited,
Centralized digital wallets, which rely on traditional making issue resolution or assistance a challenge for users.
financial intermediaries, often fall short in terms of The need for users to manage multiple wallets for different
security. These wallets are vulnerable to hacking, fraud, cryptocurrencies due to limited support and the lack of
and mismanagement, putting users' digital assets at risk. standardized user protections are other drawbacks.
Additionally, they necessitate a level of trust in third-party
entities, raising concerns about control and privacy. The Moreover, the irreversibility of blockchain
complexities associated with blockchain technology also transactions and ongoing regulatory uncertainties contribute
hinder its widespread adoption, making it difficult for to the limitations of decentralized wallet applications.
everyday users to take advantage of the benefits it offers. Lastly, concerns related to user privacy and the need for
Given these issues, there is a pressing need for extensive user education further compound the challenges
decentralized walletapplications. These wallets can provide in achieving mainstream adoption of these wallets.
users with control, security, and transparency over their Addressing these limitations is crucial to enhance the
digital assets, reducing reliance on centralized financial accessibility, security, and user-friendliness of decentralized
institutions and addressing the trust and security concerns wallet applications for a wider user base.
inherent in traditional wallets. To achieve this overarching
aim, the project has set several specific objectives. First, III. LITERATURE SURVEY
the project will entail in-depth research and analysis of
various blockchain platforms to determine the most The research paper provides a comprehensive
suitable one for wallet development. Subsequently, the overview of decentralized applications (DApps) in
team will design and develop the decentralized wallet blockchain ecosystems. It delves into the various types of
application, with a strong focus on creating an intuitive DApps, the blockchain platforms they operate on, and the
user interface. In terms of security, robust features, challenges associated with their development and
including private key management and encryption, will be deployment. The paper explores security, privacy, and the
implemented. Rigorous testing will be conducted to ensure role of smart contracts in DApps. It also offers insights into

IJISRT24MAR2082 www.ijisrt.com 3061


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR2082

use cases and future trends. Thissurvey serves as a valuable V. METHODOLOGY


resource for understanding the foundations and
complexities of DApps, providing essential guidance for A. Gather Knowledge:
the development of a decentralized wallet application in the In the creation of cryptocurrency applications,
blockchain. blockchain technology is essential. A blockchain is a series
of blockchain ledger that are connected via a cryptologic
In this research paper, we can extract valuable insights and contain digital information (data). The main goal of
to enhance the security and investigative capabilities of our employing it is to make it possible to share sensitive data
wallet application. Consider integrating the data safely.
visualization techniques and investigative tools discussed in
the paper to help users track and analyze their wallet B. Using Open-Source Libraries:
transactions more effectively. This could offer users a The majority of crypto currencies are free to use. So,
deeper understanding of their wallet activity, enhancing we don’t need to get started from the bottom. We used free
transparency and security. resources and programs that are already out there, such as
the Coinbase SDK or the Bitcoin J SDK. The Java
This research paper is a valuable resource for our library Coinbase SDK is cross- platform. It aids in the
project on a decentralized blockchain wallet application. development of Bitcoin wallets for both iOS and Android.
We can use insights from this paper to bolster the security Thislibrary also supports a wide variety of widely used
and privacy aspects of our wallet application. By doing so, languages, like Python, Java, Ruby, etc. The Bitcoin J
our wallet application can offer users an enhanced level of SDK includes thorough documentation and is simple to
security and privacy for their transactions. These use. Additionally, Bitcoin J is JVM-compatible and
techniques allow for increased anonymity and strong supports its language ecosystem, including C++,
protection of transaction details, aligning perfectly with the JavaScript, Ruby, Python, etc.
principles of decentralization and security within the
blockchain ecosystem. C. Using APIs:
A Bitcoin wallet software with plenty of features
IV. PROPOSED SYSTEM may be created by utilizing APIs. You can synchronize
your cryptocurrency wallet with the blockchain ecosystem
This Proposed system is designed to address the using a distributed ledger API. You may select from the
limitations of existing solutions while prioritizing user- most well-liked APIs listed here: Coinbase, Bitcore,
friendliness, security, and functionality. To enhance user- SimpleSwap, and Factom. Your development team may
friendliness, the system will feature an intuitive and quickly perform the required processes using the APIs,
accessible interface, making it user-centric to cater to both accelerating the development of the project.
blockchain enthusiasts and those less familiar with the
technology. In tackling account recovery challenges, it will D. Blockchain Platform Selection:
implement a robust and secure mechanism, potentially The first crucial decision was to select the appropriate
utilizing multi-factor authentication or social recovery to blockchain platform for the wallet. Ethereum was chosen
ensure users can regain access to their wallets in the event due to its widespread adoption and robust smart contract
of key loss. Scalability issues will be mitigated by capabilities. Ethereum wallets serve as applications
supporting multiple blockchain networks and utilizing off- empowering users with control over their accounts.
chain or layer-2 solutions to optimize transaction speed and Analogous to a physical wallet, they encompass all
cost-efficiency for a wide range of use cases. Advanced essential elements to authenticate identity and manage
security measures, such as hardware wallet integration and assets. With a wallet, users can access applications, review
biometric authentication, will fortify user asset protection. balances, execute transactions, and verify their identities
seamlessly.
Additionally, responsive customer support,
comprehensive asset support, user protections, and E. Choosing the Right Stack:
transaction verification mechanisms will collectively Your app will succeed if the appropriate technological
enhance user trust and satisfaction. To address transaction stack is used. For instance, we have used Flutter to create
reversibility, the system will introduce features for an application. Java or Kotlin are the two options for
transaction verification, reducing the risk of accidental or developing native Android apps. Swift or Objective-C are
malicious transfers. Privacy concerns will be tackled with also options foriOS apps.
options for coin mixing and transaction obfuscation,
ensuring user anonymity when needed. Moreover, the F. Integration with Blockchain:
system will provide extensive educational resources, guides, A back-end system was developed to interact with the
and tools to empower users with blockchain knowledge and Ethereum blockchain. This included APIs for transaction
maximize their proficiency in utilizing the wallet. processing, balance queries, and smart contract interactions.

IJISRT24MAR2082 www.ijisrt.com 3062


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR2082

G. Activate Security: H. Get Started on Application Development:


When developing Bitcoin wallet software, security is Therefore, when we were ready to begin developing
of the utmost importance. You should make sure your the crypto wallet app, we were sure to do the following
cryptocurrency app has top-notch security because of steps:
this. Consider using 2FA, which uses hardware
authentication, face ID, and fingerprints, to bolster the  Choose all of our app’s features.
security of the crypto wallet app. The creators are  Assemble our database and write the application code.
responsible for ensuring ongoing security upgrades. They  Create a user-friendly, straightforward interface.
must swiftly locate any bugs and other security  Before releasing our wallet, we will make sure to do
vulnerabilities and resolve them utilizing the most recent thorough tests.
technologies.

Fig 1: AWS Cloud

VI. SYSTEM DESIGNS The system also accounts for the user's internet
connection status, providing options for both online and
The system begins with a user prompt at the start, offline storage. Online storage implies that the wallet is
inquiring about the amount of Bitcoin stored in the wallet. connected to the internet, while offline storage means the
This initial question serves as a means of understanding the wallet operates without a constant internet connection. This
user's current cryptocurrency holdings. Following this, the choice often revolves around the user's security preferences,
flowchart diverges intotwo paths, asking whether the user is with offline storage considered more secure due to its
willing to purchase a wallet. reduced exposure to potential online threats.

The first path involves the choice between a mobile In summary, the system facilitates a user's decision-
wallet or a web wallet. This decision primarily hinges on making process when it comes to decentralized wallet
the user's preferred mode of access and convenience. A applications. It tailors the wallet choice to the user's
mobile wallet offers on-the-go access through a smartphone current Bitcoin holdings, willingness to purchase a wallet,
app, while a web wallet is accessible through a web preferred mode of access, and the level of security they
browser on various devices. desire based on their choice of a mobile, web, or
hardware wallet, as well as their internet connection
The second path offers the option of a hardware status. This comprehensive approach addresses a range
wallet, which is known for its enhanced security of user needs and security considerations in the realm of
features. Users can select this option if they prioritize cryptocurrency storage.
maximum protection for their digital assets. This choice
may depend on the user's risk tolerance and the overall
security posture of their cryptocurrency holdings.

IJISRT24MAR2082 www.ijisrt.com 3063


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR2082

VII. DATABASE

Every application necessitates a repository for storing


data gathered from users, devices, and the application itself.
Databases serve as critical backend systems, facilitating the
storage, management, updating, and analysis of data across
various applications, ranging from small-scale back-office
systems to large-scale mobile and consumer web
applications with global reach. To construct an application
enabling users to monitor their digital asset balances across
multiple blockchains, it's imperative to host a web
application that is publicly accessible and capable of
accommodating users connecting their digital asset wallets
to the application. Figure 4 depicts the architecture
diagram, showcasing the core AWS services and
components constituting the digital asset portfolio tracker
sample application.

Fig 2: Methodology for the Project

Fig 3: Database

IJISRT24MAR2082 www.ijisrt.com 3064


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR2082

VIII. RESULT

Fig 6: Portfolio Balance of the Logged-in User


Fig 4: Welcome Page

Fig 5: After Login Fig 7: Market Value

IJISRT24MAR2082 www.ijisrt.com 3065


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR2082

IX. FUTURE SCOPE

In the future we will implement an android application


that will provide the users to access trading features of the
cryptocurrency that has been added. Security of the app will
also be checked and more security will be provided.
Furthermore, the user interface will also be improved so if
there exists any complication that will be solved. Latest
conversion rates that calculate transaction fees based on
ever-changing conversion rates. A payment gateway
integrated for users to buy or sell the assets efficiently.

In the current landscape, cryptocurrency exchange


platforms emerge as prime hubs for initiating
cryptocurrency trading, offering a rich resource for
cryptocurrency enthusiasts and traders. These platforms
provide the convenience of trading various cryptocurrencies
within a single interface and have the capability to integrate
numerous cryptocurrencies seamlessly.

While the crypto-world boasts millions of crypto


coins, around 700+ are actively traded globally. Among
these, prominent options like Bitcoin, Ethereum, Litecoin,
NEM, and others present lucrative investment prospects.
For traders, especially early adopters and supporters of
Bitcoin, venturing into the cryptocurrency exchange
platform realm can serve as a promising startup
opportunity, facilitating access to a diverse range of
investment options and potential growth avenues.

Fig 8: Rankings X. CONCLUSION

It is anticipated that the utilization of digital wallets


for cryptocurrencies will surge, leading to a significant
decline in the reliance on physical wallets. Notably, Bitcoin
and Ethereum, the frontrunners in the crypto sphere, are
achieving unprecedented profit records, gradually
cementing their status as legitimate currencies. Research
findings suggest that these wallets not only offer robust
security but also entail minimal additional costs compared
to traditional physical currency transactions.

Transactions conducted via cryptocurrencies incur


minimal expenses due to the direct interaction between the
two executing nodes, bypassing the need for intermediary
involvement. The only associated cost pertains to the
payment to the network facilitating the transaction, such as
the Bitcoin network. While transaction fees vary based on
the transaction speed, they are substantially lower than
those in conventional payment systems.

Furthermore, it's evident that each exchange platform


presents distinct advantages and disadvantages. Some
prioritize user-friendliness, while others emphasize
advanced trading features. Presently, there's a burgeoning
interest in commencing cryptocurrency businesses, driven
by the allure and profitability of crypto coins. Individuals
are increasingly drawn to cryptocurrency trading and
Fig 9: Profile of Logged-in User exchange platforms, recognizing the potential for lucrative
returns. Forecasts indicate that the cryptocurrency trading
and exchange marketplace could outpace the growth

IJISRT24MAR2082 www.ijisrt.com 3066


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR2082

witnessed in 2018, with the trading volumes of major


cryptocurrencies poised for exponential expansion in the
future.

REFERENCES

[1]. Blockchain-Based Decentralized Application : A


Survey, IEEE 13 March 2023.
[2]. Secure Deterministic Wallet and Stealth Address,
IEEE 5 September 2022.
[3]. A Visualization System for Bitcoin Wallet
Investigation, IEEE March/April 2023.
[4]. Analysis of Cryptocurrency Wallet 03 September
2019.
[5]. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic
Cash System, 2008, Accessed: Apr.15, 2023.
[Online].Available: https://bitcoin.org/ bitcoin.pdf
[6]. MetaMask, “MetaMask browser
extension,”Accessed:Apr.15,2023.[Online].
Available:https://github.com/MetaMask/metamask
extension
[7]. Li et al., “A survey on the security of blockchain
systems,” Future Gener. Comput. Syst., vol. 107, pp.
841–853 2017.
[8]. DAppRadar, DApp Industry Report, Aug.
2022. [Online]. Available:
https://dappradar.com/blog/dappradar-blockchain-
industry-reportaugust-2022
[9]. Wikipedia, “Initial Coin Offering,” Accessed: Apr.
15, 2023. [Online]. Available:
https://en.wikipedia.org/wiki/Initial_coin_offering.
[10]. D. Mingxiao et al., “A review on consensus
algorithm of blockchain,” in Proc. IEEE Int. Conf.
Syst., Man, Cybern., 2017, pp. 2567–2572.
[11]. G. Foroglou and A. L. Tsilidou, “Further
applications of the blockchain,” 2015, Accessed:
Apr. 15, 2023. [Online]. Available:
https://www.researchgate.net/publication/27630449
2_ Further_applications_of_the_blockchain
[12]. C. Sillaber and B. Waltl, “Life cycle of smart
contracts in blockchain ecosystems,” Datenschutz
und Datensicherheit-DuD, vol. 41, no. 8, pp. 497–
500, 2017.
[13]. V. Buterin, “Ethereum white paper,” 2013.
[Online]. Available:
https://ethereum.org/whitepaper/
[14]. Binance Smart Chain, “Binance Smart Chain.”
Accessed: Apr. 15, 2023. [Online]. Available:
https://github.com/binance-chain/bsc
[15]. EOSIO, “Technical White Paper v2,” Accessed:
Apr. 15, 2023. [Online]. Available:
https://github.com/EOSIO/Documentation/blob/
master/Technical
[16]. TRON, TRON Website, Accessed: Apr. 15, 2023.
[Online]. Available: https://tron.network/
[17]. Fantom, Fantom Website, Accessed: Apr. 15, 2023.
[Online]. Available: https://fantom.foundation/ [18]
Polygon, Polygon Website, Accessed: Apr. 15,
2023. [Online]. Available:
https://polygon.technology.

IJISRT24MAR2082 www.ijisrt.com 3067

You might also like